CVE-2024-51566

6.5 MEDIUM

📋 TL;DR

This vulnerability in the NVMe driver queue processing allows a guest VM to trigger infinite loops in the host's hypervisor, potentially causing denial-of-service conditions. It affects systems using bhyve hypervisor on FreeBSD and NetApp products with vulnerable NVMe implementations. The vulnerability requires guest VM access to exploit.

💻 Affected Systems

Products:
  • FreeBSD bhyve hypervisor
  • NetApp products with NVMe support
Versions: FreeBSD 13.2-RELEASE before p5, 13.3-RELEASE before p3, 14.1-RELEASE before p1, 14.2-RELEASE before p1; NetApp specific versions per NTAP advisory
Operating Systems: FreeBSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using bhyve hypervisor with NVMe device emulation enabled for guest VMs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host system freeze or crash due to infinite loop consuming all CPU resources, affecting all VMs on the host.

🟠

Likely Case

Performance degradation or temporary unavailability of the affected host system until manual intervention.

🟢

If Mitigated

Limited impact with proper VM isolation and monitoring in place to detect and restart affected systems.

🌐 Internet-Facing: LOW - Requires guest VM access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Malicious or compromised guest VMs could disrupt host availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires guest VM access and ability to send specific NVMe commands to trigger the infinite loop condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FreeBSD: 13.2-RELEASE-p5, 13.3-RELEASE-p3, 14.1-RELEASE-p1, 14.2-RELEASE-p1; NetApp: See NTAP-20250207-0008

Vendor Advisory: https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc

Restart Required: Yes

Instructions:

1. Update FreeBSD system using freebsd-update fetch && freebsd-update install. 2. Reboot the host system. 3. For NetApp systems, follow vendor-specific update procedures from NTAP advisory.

🔧 Temporary Workarounds

Disable NVMe device emulation

all

Remove NVMe device passthrough from guest VM configurations to prevent exploitation.

Edit bhyve VM configuration to remove NVMe device lines

Isolate guest VMs

all

Ensure guest VMs are properly isolated and only trusted users have administrative access.

🧯 If You Can't Patch

  • Monitor host CPU usage for abnormal spikes indicating infinite loop conditions
  • Implement strict access controls for guest VM administration to prevent malicious use

🔍 How to Verify

Check if Vulnerable:

Check FreeBSD version with 'uname -a' and compare against affected versions. Check if bhyve is running with NVMe devices.

Check Version:

uname -a; freebsd-version -ku

Verify Fix Applied:

Verify FreeBSD version is patched: 'freebsd-version -ku'. Check that system updates were applied successfully.

📡 Detection & Monitoring

Log Indicators:

  • High CPU usage alerts
  • VM guest abnormal behavior logs
  • System watchdog or crash reports

Network Indicators:

  • Unusual NVMe command patterns from guest VMs if monitored

SIEM Query:

host.cpu.usage > 95% AND process.name = 'bhyve' AND duration > 300s

🔗 References

📤 Share & Export